US Department of Defense Takes Offensive in Cyberwar
Even though it’s unlikely the Department of Defense (DoD) read my new book before putting together their plan, I can at least say it’s an example of great minds thinking
Even though it’s unlikely the Department of Defense (DoD) read my new book before putting together their plan, I can at least say it’s an example of great minds thinking
The last week or so has been a busy one in the ongoing Cyberwar. China is pushing back against the US, blaming Cyberattacks coming from a particular office building in
If a building has twenty exterior doors and you lock nineteen of them, does that make you 95% secure? We call this question the “20 doors” problem. The answer: of
The suspense has been overwhelming. Since I began writing for this blog, I’ve been talking about the Agile Architecture Revolution. Not to be confused with Agile methodologies like Scrum, I
Just in case your head wasn’t in the clouds last week, you may have missed this story: the Microsoft Azure Cloud went down for hours, ostensibly as a result of
What do you get when you combine increasingly professional Cyberattacks from China with a Congressional budget stalemate threatening a sequester that will drastically slash our Cyberdefense efforts? The answer: a
Backslashes in C# and C++CLI are widely used in Windows file paths and with escape characters. Use of double backslashes and backslashes to perform special functions is well described in
Virtual Private Clouds (VPCs) have obvious promise, delivering the best compromise between Public and Private Clouds. The idea with a VPC is to create an enclave in a Public Cloud
Remember the old joke about the fellow carrying bags of sand across the US/Mexican border on his bike? The guards couldn’t find any contraband in the sand. He returned week